WO2006037163A1 - Peer signalling protocol and system for decentralized traffic management - Google Patents

Peer signalling protocol and system for decentralized traffic management Download PDF

Info

Publication number
WO2006037163A1
WO2006037163A1 PCT/AU2005/001514 AU2005001514W WO2006037163A1 WO 2006037163 A1 WO2006037163 A1 WO 2006037163A1 AU 2005001514 W AU2005001514 W AU 2005001514W WO 2006037163 A1 WO2006037163 A1 WO 2006037163A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
endpoints
endpoint
policy
protocol
Prior art date
Application number
PCT/AU2005/001514
Other languages
French (fr)
Inventor
Alan Noble
Original Assignee
Netpriva Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2004905742A external-priority patent/AU2004905742A0/en
Application filed by Netpriva Pty Ltd filed Critical Netpriva Pty Ltd
Priority to AU2005291837A priority Critical patent/AU2005291837A1/en
Priority to AT05789430T priority patent/ATE474275T1/en
Priority to DE602005022344T priority patent/DE602005022344D1/en
Priority to EP05789430A priority patent/EP1817683B1/en
Publication of WO2006037163A1 publication Critical patent/WO2006037163A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/24Negotiation of communication capabilities

Definitions

  • the present invention relates to a method and a signalling protocol for decentralized traffic management in a computer network.
  • Small networks comprising multiple endpoint devices, such as desktop computers, notebook computers and handheld computers, usually share a link to the external network, such as the Internet or Wide Area Network (WAN), via a common access device, such as a DSL modem and/or router.
  • WAN Wide Area Network
  • a common problem is that one endpoint can often occupy more than its fair share of the available bandwidth. This is particularly true when one or more endpoint users are downloading large files, while another endpoint user is attempting to use delay-sensitive networked applications, such as voice over IP (VoIP), video streaming or online games.
  • VoIP voice over IP
  • traffic management appliance in series with the access device.
  • These appliances are hardware devices that optimize network performance, through one or more of the following functions: traffic shaping, also known as bandwidth management or quality of service (QoS), compression, caching and protocol optimization.
  • traffic management functions may be integrated into an existing networking device, such as a router, obviating the need for a separate device.
  • traffic management hardware devices are expensive. Routers that implement traffic management functions are also expensive.
  • Network access devices found in small networks are relatively inexpensive products lacking quality of service (QoS) capabilities.
  • QoS quality of service
  • the cost of installing the additional hardware or more sophisticated network access devices that can implement traffic management is often prohibitive and also introduces another point of failure into the network. It is an object of the present invention to provide a method and a signalling protocol for traffic management that overcomes or at least substantially ameliorates the problems associated with the prior art.
  • a network traffic management system for managing traffic flows to a network resource including a plurality of endpoints adapted to send traffic to the network resource, means to set and communicate a policy for access to the network resource by said endpoints, a software agent associated with each of said endpoints adapted to communicate with each other said agent, and to negotiate access to the network resource for the respective endpoint in accordance with the policy and the information communicated by each other agent.
  • the invention may be said to reside in a method of shaping traffic presented to a network resource in a local area network including the steps of providing software agents at each of a plurality of network endpoints on a local area network, said agents being adapted to communicate with each other agent by signals passed over the local area network; providing at each endpoint means to regulate the traffic presented to the network resource by that endpoint; providing and communicating to each agent a policy for the allocation of use of the network resource among the plurality of endpoints; each agent communicating with each other agent to negotiate access to the network resource according to the policy and the communicated traffic requirements of each endpoint.
  • the invention may be said to reside in a network communications protocol adapted to allow endpoints in a local area network to communicate their respective requirements for access to a shared network resource to each other.
  • the protocol includes means for endpoints to identify each others presence on the network.
  • the protocol includes means to communicate relative priority information between endpoints.
  • the protocol includes means to communicate a policy for access to the shared network resource among all endpoints.
  • the local area network at least one endpoint adapted to set and communicate said policy for access.
  • This endpoint is called a manager.
  • the protocol includes means to communicate any or all of an endpoint's requested bandwidth, the data rate of the network resource, network statistics or network data.
  • the protocol includes means to implement a distributed cache amongst a plurality of endpoints.
  • the network endpoints are computing devices.
  • the network endpoints are client devices such as desktop computers, laptop computers and handheld computers.
  • an endpoint is a computer server.
  • an endpoint is a computer peripheral, such as a printer or scanner.
  • the network resource is an access point to a wide area network.
  • the network resource is an access point to the internet.
  • the policy for allocation of access to the network resource is a policy for allocation of a portion of bandwidth on a wide area network or internet connection to each endpoint, calculated as total available bandwidth available on the link divided by the number of endpoints.
  • the policy for allocation of access to the network resource is a policy for allocation of a portion of bandwidth on a wide area network or internet connection to each endpoint, based on pre-set or communicated relative priority of each endpoint.
  • each endpoint includes means to implement the requirements of the policy by rate limiting.
  • the local area network may be a wireless network or a 3G network.
  • Figure 1 is diagram of a local area network upon which the method and a signalling protocol for decentralized traffic management of the invention is implemented.
  • Figure 2 is a diagram of the network of Figure 1 , showing data flows when the invention is implemented; and Figure 3 is a table showing a basic set of protocol signals for an embodiment of the Peer Signalling Protocol of the invention.
  • Figure 4 is a table setting out the header fields of the Protocol of the invention.
  • Figure 5 illustrates time slicing for a synchronous embodiment of the invention.
  • a desktop computer 10 a server computer 11 and a laptop computer12.
  • These are network endpoints, which share access to an external network 13 via a local area network (LAN)14 and a common access device, being a DSL modem and router 15.
  • LAN local area network
  • common access device being a DSL modem and router 15.
  • the endpoints may be any computing devices and the common access device may be a router, cable modem or network switch.
  • the external network 13 shown as a corporate wide area network (WAN), may be the internet.
  • WAN corporate wide area network
  • the network endpoints on the Local Area Network (LAN) signal each other so as negotiate access to the shared external network.
  • the system thereby implements a virtual centralized traffic manager, by means of decentralized traffic management.
  • LAN data rates are between 10OMbps and1 OGbps
  • WAN data rates are typically under 45Mbps (T3) for a corporate WAN, or 1 Mbps for a typical DSL Internet link.
  • T3 45Mbps
  • 10OMbytes of data can be transmitted over a IOOMbps LAN, which is equivalent to one million 100- byte messages.
  • the high data rates of the LAN make it feasible to implement a signalling protocol between endpoints that enables endpoints to negotiate access to the WAN and adjust on the fly what they are transmitting over the WAN.
  • the fast LAN is used as a signalling channel to control access to the much slower WAN.
  • Signalling is the exchange of information between peer endpoints on a fast LAN to control access to a slower WAN.
  • the large disparity in speed means that the bandwidth used by the signalling does not have a detrimental effect on the data rate presented to the WAN.
  • Figure 2 is a logical block diagram of the system of Figure 1.
  • each endpoint includes software modules21 to implement a decentralized traffic management system. These software modules communicate by sending data signals 23 to each other across the LAN 14. This data comprises signals 23 which implement the Peer Signalling Protocol (PSP) of the invention.
  • PSP Peer Signalling Protocol
  • Each endpoint so equipped 10, 11 , 12 is referred to as a PSP host, and all PSP hosts are peers.
  • Endpoints signal their network traffic requirements to their peers, and each endpoint listens for the PSP signals from other peers.
  • each endpoint In order to send and receive data over the WAN, each endpoint must gain access to the WAN bandwidth.
  • Endpoints negotiate their use of WAN bandwidth according to a policy.
  • a policy is a formal set of statements that define how the network's resources are to be allocated among network users, hosts, applications and other devices.
  • the policy may be static and pre- configured, or dynamic and communicated via the signalling protocol or another mechanism.
  • One or more of the endpoints may be designated managers. These determine and broadcast the policy in effect to their peers.
  • a manager In the absence of a manager, there may be a default (pre-defined) policy, such as, "highest priority host gets 50% of the bandwidth”. Note that while the use of a manager centralizes the policy control, the policy enforcement is decentralized. Each endpoint controls the rate at which it send data to the WAN itself, in response to the set policy. This control is performed by a rate limiter 28.
  • TransmitPeriod There are two defined time periods, TransmitPeriod and TransmitWait. All PSP hosts, while attempting to transmit traffic regularly broadcast a transmit messages every TransmitPeriod milliseconds, providing another host with higher priority has not transmitted during the last TransmitPeriod milliseconds. A PSP host will refrain from broadcasting transmit messages if another host with higher priority is transmitting. A transmit message may not be broadcast less than TransmitWait milliseconds prior to the last message.
  • the body of the transmit message may specify parameters, such as the requested bandwidth, priority, and other information as required, or it may be empty.
  • the set operation is sent out by a PSP Manager to establish a policy.
  • a PSP Manager is an endpoint configured to load and deploy policies.
  • the body of the set message contains the policy to be established.
  • the default policy is for a lower priority host to simply back off in the presence of traffic from a higher priority host.
  • the info operation indicates that an endpoint has new information to share, such as network statistics or the WAN data rate.
  • PSP is a UDP-based broadcast protocol.
  • the PSP header is shown in Figure 4.
  • the system flexibly partitions the WAN bandwidth among the endpoints.
  • the exact partitioning of bandwidth depends on the installed policy, and may be fair or unfair, static or dynamic.
  • the goal of the system is to ensure that the sum of the endpoint data rates is always equal to the overall WAN data rate, R WAN , as specified by the following rate equation.
  • Ri is the rate of endpoint i and R WAN is the WAN data rate.
  • R WAN is the WAN data rate.
  • the system attempts to maintain the equality of the left and right sides of the rate equation in both send and receive directions at all times.
  • Each endpoint enforces its rate, Ri, by means of a bidirectional rate limiter 28 that controls the maximum rate of traffic sent and received.
  • the rate limiter need only limit traffic 25 sent to or received from the WAN, not traffic 26 that is internal to the LAN.
  • a congested WAN link means that endpoints are competing for bandwidth, rather than negotiating a guaranteed share of the bandwidth.
  • a fair, static partitioning across N endpoints simply limits each endpoint to precisely 1/N th of the WAN data rate, i.e.:
  • Static partitioning can be implemented without any form of signalling but results in wasted bandwidth whenever one or more of the endpoints require less than their share.
  • a dynamic partitioning scheme allocates bandwidth across the subset of endpoints that are actually transmitting at any given time.
  • Endpoints can determine what other endpoints are transmitting either implicitly by sniffing what is on the physical network, or explicitly via signalling.
  • endpoints broadcast or multicast PSP transmit signals periodically whenever they are transmitting. By counting the number of transmitters present during a given interval, the system can determine the total number of endpoints that are currently transmitting and partition bandwidth accordingly. Further, by including a host priority ⁇ n the transmit signal, lower-priority endpoints can be configured to back off transmitting either partially or completely in the presence of high-priority traffic. This can be used to implement a form of priority queuing.
  • a further embodiment includes an application priority in the transmit signal to enable priority queuing by software application, either in combination with host priority or independently.
  • a further embodiment includes an endpoint's requested bandwidth in the transmit message.
  • the requested bandwidth can be pre-configured or can be computed dynamically by summing the minimum required bandwidth required for each networked application running on a given endpoint.
  • the minimum required bandwidth for each application can be specified in the policy.
  • Prior art techniques such as windows-based traffic management, can be used to determine what networked applications are running on a given endpoint at a given time. The system will then attempt to allocate each endpoint its requested bandwidth in order of priority. Each endpoint first sums the requested bandwidth from each transmit signal. If more bandwidth is requested than is available, endpoints will renegotiate their bandwidth requirements according to the installed policy and re-transmit accordingly. For example, one policy could require endpoints to proportionally reduce their requested bandwidth, i.e., in a pro rata fashion. Another, policy could require low-priority endpoints to temporarily stop transmitting.
  • a further embodiment specifies a minimum guaranteed bandwidth for each endpoint, but permits endpoints to burst above their minimum if not all of the WAN link is being utilized. Endpoints signal their intent to use additional bandwidth, to avoid multiple endpoints from attempting to overallocate bandwidth.
  • An embodiment with improved efficiency can be implemented by synchronizing the system time of each endpoint and assigning each endpoint a unique signalling time slot, as described in Figure 5. For example, if there are 100 endpoints transmitting 10 times/second (i.e., every 100 milliseconds) then signals can be spread out every millisecond. Synchronization can be performed via a standard synchronization protocol, such as Network Time Protocol (NTP).
  • NTP Network Time Protocol
  • Endpoints periodically determine the WAN data rate, i.e., the speed of the WAN link.
  • the WAN data rate may be dynamic (vary over time).
  • CIR Committed Information Rate
  • EIR Excess Information Rate
  • endpoints can be simply pre-configured with this information via the installed policy.
  • the system computes the data rate by performing a speed test.
  • Prior art describes speed testing for a single host.
  • the method herein is for performing speed testing in a distributed system.
  • the speed test involves transferring data to or from one or more known fast servers, herein known as speed test servers. (On the Internet, there are public speed test servers, such as DSLreports.com. It is also possible to set up and use a speed test server on a corporate network.)
  • the data rate is computed by clocking the data transfer and dividing the data size in bits by the transfer time in seconds minus connection/disconnection time (if using TCP or another connection-oriented protocol.
  • the key requirement is that there is sufficient data and both the sending and receiving hosts are sufficiently fast to completely saturate the WAN link.
  • a designated endpoint In the dedicated speed test, a designated endpoint, known as the tester, requests other endpoints to briefly pause transmitting, then performs a speed test.
  • the tester first sends a pause signal to the other endpoints to request quiet time. Endpoints receiving a pause interpret may elect to delay or ignore the pause request. Therefore the tester must wait until all other endpoints cease transmitting, or give up and try again later if transmissions continue unabated.
  • the tester performs a speed test, possibly in both directions.
  • the tester Upon computing the WAN data rate, which typically takes no more than a couple of seconds, the tester communicates the results via the info or set signal.
  • the manager listens for info signals and will set the new WAN data rate.
  • the speed test is performed by clocking part of an existing data transfer. Any endpoint can perform the test providing the following two conditions are met:
  • a piggyback speed test may be combined with downloading an operating system update or updating a local cache.
  • one active measurement technique involves injecting multiple Internet Control Message Protocol (ICMP) 'ping' packets into the WAN and measuring inter-packet delay, round trip times, and packet losses.
  • ICMP Internet Control Message Protocol
  • the speed test server may also be utilized for performing active measurements.
  • Endpoints that implement the peer signalling protocol are referred to as signalling devices.
  • all endpoints should be configured to be signalling, to ensure that the traffic contributed by all endpoints is taken into account.
  • Traffic originating from signalling devices can be identified by signing packets, namely, adding a signature to each packet.
  • One signing technique is packet colouring or packet marking, i.e., writing specific packet header fields, for example, the IP Layer 3 Type of Service (ToS) or Differentiated Services (DiffServ) field. Marks may be altered dynamically to minimize the risk of spoofing by non-signalling devices.
  • ToS IP Layer 3 Type of Service
  • DiffServ Differentiated Services
  • GRE Generic Routing Encapsulation
  • non-signalling endpoints will not sign packets, and can therefore be identified by the absence of a packet signature, i.e., the correct packet mark or encapsulation.
  • Each endpoint in the system may be optionally configured to store data that is requested from a data source via the WAN, thereby creating a distributed cache. Endpoints requesting data via the WAN can first request if data is available from one of their peers via a get signal. If a peer already has the data, the data can fetched quickly via the LAN, thereby eliminating redundant data transfers via the slower WAN.
  • Each endpoint in the system may optionally store numerous network statistics, such as bandwidth, round-trip time, latency, etc. Statistics for the system as a whole can then be aggregated to one or more designated reporter, specified by the policy.
  • the reporter may be local to the LAN or accessible via the WAN.
  • a possible aggregation method is Push-based aggregation wherein each endpoint will periodically push statistics to the reporter via an info signal.
  • Query-based aggregation may be used wherein The reporter will periodically query each endpoint with a get signal and request the latest statistics.
  • Each endpoint in the system may be optionally configured via the installed policy to detect and respond to anomalous network conditions. For example, so-called port scanning or Denial of Service (DOS) style attacks, resulting in hosts creating and destroying large numbers of connections per second, are characteristic of network viruses. Such conditions can be detected and trigger self-policing behavior, for example, rate limiting some or all traffic originating from the infected host.
  • DOS Denial of Service

Abstract

A network communications protocol to allow endpoints in a computer network to communicate their respective requirements for access to a network resource to each other; and to communicate a policy for access to the network resource by said endpoints, and to allow negotiation of access to the network resource for the respective endpoint in accordance with the policy and the requirements information communicated by other endpoints. The network resource may be access to a WAN connection or an internet connection, or may be a device such as a network printer or network attached storage.

Description

PEER SIGNALLING PROTOCOL AND SYSTEM FOR DECENTRALIZED TRAFFIC MANAGEMENT
The present invention relates to a method and a signalling protocol for decentralized traffic management in a computer network.
Small networks, comprising multiple endpoint devices, such as desktop computers, notebook computers and handheld computers, usually share a link to the external network, such as the Internet or Wide Area Network (WAN), via a common access device, such as a DSL modem and/or router.
A common problem is that one endpoint can often occupy more than its fair share of the available bandwidth. This is particularly true when one or more endpoint users are downloading large files, while another endpoint user is attempting to use delay-sensitive networked applications, such as voice over IP (VoIP), video streaming or online games.
It is known to solve these problems by deploying a so-called traffic management appliance in series with the access device. These appliances are hardware devices that optimize network performance, through one or more of the following functions: traffic shaping, also known as bandwidth management or quality of service (QoS), compression, caching and protocol optimization. Alternatively, traffic management functions may be integrated into an existing networking device, such as a router, obviating the need for a separate device. However, traffic management hardware devices are expensive. Routers that implement traffic management functions are also expensive.
Network access devices found in small networks, however, are relatively inexpensive products lacking quality of service (QoS) capabilities. The cost of installing the additional hardware or more sophisticated network access devices that can implement traffic management is often prohibitive and also introduces another point of failure into the network. It is an object of the present invention to provide a method and a signalling protocol for traffic management that overcomes or at least substantially ameliorates the problems associated with the prior art.
Other objects and advantages of the present invention will become apparent from the following description, taken in connection with the accompanying drawings, wherein, by way of illustration and example, embodiments of the present invention are disclosed.
In one form of this invention there is proposed a network traffic management system for managing traffic flows to a network resource including a plurality of endpoints adapted to send traffic to the network resource, means to set and communicate a policy for access to the network resource by said endpoints, a software agent associated with each of said endpoints adapted to communicate with each other said agent, and to negotiate access to the network resource for the respective endpoint in accordance with the policy and the information communicated by each other agent.
In a further form the invention may be said to reside in a method of shaping traffic presented to a network resource in a local area network including the steps of providing software agents at each of a plurality of network endpoints on a local area network, said agents being adapted to communicate with each other agent by signals passed over the local area network; providing at each endpoint means to regulate the traffic presented to the network resource by that endpoint; providing and communicating to each agent a policy for the allocation of use of the network resource among the plurality of endpoints; each agent communicating with each other agent to negotiate access to the network resource according to the policy and the communicated traffic requirements of each endpoint. In a yet further form, the invention may be said to reside in a network communications protocol adapted to allow endpoints in a local area network to communicate their respective requirements for access to a shared network resource to each other.
In preference, the protocol includes means for endpoints to identify each others presence on the network.
In preference, the protocol includes means to communicate relative priority information between endpoints.
In preference, the protocol includes means to communicate a policy for access to the shared network resource among all endpoints.
In preference, there resides on the local area network at least one endpoint adapted to set and communicate said policy for access. This endpoint is called a manager.
In preference, the protocol includes means to communicate any or all of an endpoint's requested bandwidth, the data rate of the network resource, network statistics or network data.
In preference, the protocol includes means to implement a distributed cache amongst a plurality of endpoints.
In preference, the network endpoints are computing devices.
In preference, the network endpoints are client devices such as desktop computers, laptop computers and handheld computers.
In preference an endpoint is a computer server. In preference an endpoint is a computer peripheral, such as a printer or scanner.
In preference the network resource is an access point to a wide area network.
In preference, the network resource is an access point to the internet.
In preference, the policy for allocation of access to the network resource is a policy for allocation of a portion of bandwidth on a wide area network or internet connection to each endpoint, calculated as total available bandwidth available on the link divided by the number of endpoints.
In preference, the policy for allocation of access to the network resource is a policy for allocation of a portion of bandwidth on a wide area network or internet connection to each endpoint, based on pre-set or communicated relative priority of each endpoint.
In preference, each endpoint includes means to implement the requirements of the policy by rate limiting.
In preference, the local area network may be a wireless network or a 3G network.
For a better understanding of this invention it will now be described with respect to preferred embodiments which shall be described herein with the assistance of drawings wherein;
Figure 1 is diagram of a local area network upon which the method and a signalling protocol for decentralized traffic management of the invention is implemented; and
Figure 2 is a diagram of the network of Figure 1 , showing data flows when the invention is implemented; and Figure 3 is a table showing a basic set of protocol signals for an embodiment of the Peer Signalling Protocol of the invention; and
Figure 4 is a table setting out the header fields of the Protocol of the invention; and
Figure 5 illustrates time slicing for a synchronous embodiment of the invention.
Now referring to the illustrations, and in particular to Figure 1 , there is shown a desktop computer 10, a server computer 11 and a laptop computer12. These are network endpoints, which share access to an external network 13 via a local area network (LAN)14 and a common access device, being a DSL modem and router 15. In other embodiments (not shown) the endpoints may be any computing devices and the common access device may be a router, cable modem or network switch. The external network 13 shown as a corporate wide area network (WAN), may be the internet.
The network endpoints on the Local Area Network (LAN) signal each other so as negotiate access to the shared external network. The system thereby implements a virtual centralized traffic manager, by means of decentralized traffic management.
This is possible because of the large disparity between LAN and WAN data rates, which is typically 2 or 3 orders of magnitude. LAN data rates are between 10OMbps and1 OGbps, whereas WAN data rates are typically under 45Mbps (T3) for a corporate WAN, or 1 Mbps for a typical DSL Internet link. In the time it takes to transmit 1 Mbyte of data over a 1 Mbps WAN link, 10OMbytes of data can be transmitted over a IOOMbps LAN, which is equivalent to one million 100- byte messages.
The high data rates of the LAN make it feasible to implement a signalling protocol between endpoints that enables endpoints to negotiate access to the WAN and adjust on the fly what they are transmitting over the WAN. Essentially, the fast LAN is used as a signalling channel to control access to the much slower WAN. Signalling is the exchange of information between peer endpoints on a fast LAN to control access to a slower WAN. The large disparity in speed means that the bandwidth used by the signalling does not have a detrimental effect on the data rate presented to the WAN.
Figure 2 is a logical block diagram of the system of Figure 1.
As illustrated in Figure 2, each endpoint includes software modules21 to implement a decentralized traffic management system. These software modules communicate by sending data signals 23 to each other across the LAN 14. This data comprises signals 23 which implement the Peer Signalling Protocol (PSP) of the invention. Each endpoint so equipped 10, 11 , 12 is referred to as a PSP host, and all PSP hosts are peers. There is a distributed system in which endpoints emulate and perform the functions of a centralized traffic management appliance.
Applications running on the endpoints communicate data 25 which is carried by the WAN and also data 26 which is carried only by the LAN.
Endpoints signal their network traffic requirements to their peers, and each endpoint listens for the PSP signals from other peers.
In order to send and receive data over the WAN, each endpoint must gain access to the WAN bandwidth.
Endpoints negotiate their use of WAN bandwidth according to a policy. In policy-based networking such as this, a policy is a formal set of statements that define how the network's resources are to be allocated among network users, hosts, applications and other devices. The policy may be static and pre- configured, or dynamic and communicated via the signalling protocol or another mechanism. One or more of the endpoints may be designated managers. These determine and broadcast the policy in effect to their peers.
In the absence of a manager, there may be a default (pre-defined) policy, such as, "highest priority host gets 50% of the bandwidth". Note that while the use of a manager centralizes the policy control, the policy enforcement is decentralized. Each endpoint controls the rate at which it send data to the WAN itself, in response to the set policy. This control is performed by a rate limiter 28.
The major signals of this protocol are shown in Figure 3, but many more may be contemplated. As shown in the figure the signals are as follows:
transmit
There are two defined time periods, TransmitPeriod and TransmitWait. All PSP hosts, while attempting to transmit traffic regularly broadcast a transmit messages every TransmitPeriod milliseconds, providing another host with higher priority has not transmitted during the last TransmitPeriod milliseconds. A PSP host will refrain from broadcasting transmit messages if another host with higher priority is transmitting. A transmit message may not be broadcast less than TransmitWait milliseconds prior to the last message.
The body of the transmit message may specify parameters, such as the requested bandwidth, priority, and other information as required, or it may be empty.
set
The set operation is sent out by a PSP Manager to establish a policy. A PSP Manager is an endpoint configured to load and deploy policies. The body of the set message contains the policy to be established. In the illustrated embodiment, the default policy is for a lower priority host to simply back off in the presence of traffic from a higher priority host.
info
The info operation indicates that an endpoint has new information to share, such as network statistics or the WAN data rate.
get
This is sent as a request to get information, such as network statistics or cached data.
pause
This is sent to request an endpoint or endpoints to pause transmissions.
In the illustrated embodiment, PSP is a UDP-based broadcast protocol. The PSP header is shown in Figure 4.
All integers are in standard network representation.
Over Ethernet, the minimum PSP packet is 70 bytes (560 bits), broken down as follows:
Figure imgf000010_0002
It can be seen, for example, that 100 hosts broadcasting 10 times/second generate 560 kbps of LAN traffic, i.e., less than 1% of the capacity of a IOOMbps LAN. The transmission time for each signal is 5.6 microseconds. The usage of LAN resources does not therefore impact on the capacity of the LAN to present data to the WAN at the full speed which the WAN can accept.
The system flexibly partitions the WAN bandwidth among the endpoints. The exact partitioning of bandwidth depends on the installed policy, and may be fair or unfair, static or dynamic. The goal of the system is to ensure that the sum of the endpoint data rates is always equal to the overall WAN data rate, RWAN , as specified by the following rate equation.
Figure imgf000010_0001
where there are N endpoints, Ri is the rate of endpoint i and RWAN is the WAN data rate. The system attempts to maintain the equality of the left and right sides of the rate equation in both send and receive directions at all times. Each endpoint enforces its rate, Ri, by means of a bidirectional rate limiter 28 that controls the maximum rate of traffic sent and received. The rate limiter need only limit traffic 25 sent to or received from the WAN, not traffic 26 that is internal to the LAN.
If the sum of the endpoint rates is less than the actual WAN data rate that means that WAN bandwidth is under utilized. If the sum is greater than the actual WAN data rate that means that the WAN link is over utilized or congested. A congested WAN link means that endpoints are competing for bandwidth, rather than negotiating a guaranteed share of the bandwidth.
For example, a fair, static partitioning across N endpoints simply limits each endpoint to precisely 1/Nth of the WAN data rate, i.e.:
R1 = R2 -= R3... = RN = (RWAN / N)
An unfair, static portioning allocates different rates to each endpoint, while nevertheless maintaining the equality of the rate equation.
Static partitioning can be implemented without any form of signalling but results in wasted bandwidth whenever one or more of the endpoints require less than their share.
A dynamic partitioning scheme allocates bandwidth across the subset of endpoints that are actually transmitting at any given time.
Endpoints can determine what other endpoints are transmitting either implicitly by sniffing what is on the physical network, or explicitly via signalling. In the invention, endpoints broadcast or multicast PSP transmit signals periodically whenever they are transmitting. By counting the number of transmitters present during a given interval, the system can determine the total number of endpoints that are currently transmitting and partition bandwidth accordingly. Further, by including a host priority \n the transmit signal, lower-priority endpoints can be configured to back off transmitting either partially or completely in the presence of high-priority traffic. This can be used to implement a form of priority queuing.
A further embodiment includes an application priority in the transmit signal to enable priority queuing by software application, either in combination with host priority or independently.
A further embodiment includes an endpoint's requested bandwidth in the transmit message. The requested bandwidth can be pre-configured or can be computed dynamically by summing the minimum required bandwidth required for each networked application running on a given endpoint. The minimum required bandwidth for each application can be specified in the policy. Prior art techniques, such as windows-based traffic management, can be used to determine what networked applications are running on a given endpoint at a given time. The system will then attempt to allocate each endpoint its requested bandwidth in order of priority. Each endpoint first sums the requested bandwidth from each transmit signal. If more bandwidth is requested than is available, endpoints will renegotiate their bandwidth requirements according to the installed policy and re-transmit accordingly. For example, one policy could require endpoints to proportionally reduce their requested bandwidth, i.e., in a pro rata fashion. Another, policy could require low-priority endpoints to temporarily stop transmitting.
A further embodiment specifies a minimum guaranteed bandwidth for each endpoint, but permits endpoints to burst above their minimum if not all of the WAN link is being utilized. Endpoints signal their intent to use additional bandwidth, to avoid multiple endpoints from attempting to overallocate bandwidth. An embodiment with improved efficiency can be implemented by synchronizing the system time of each endpoint and assigning each endpoint a unique signalling time slot, as described in Figure 5. For example, if there are 100 endpoints transmitting 10 times/second (i.e., every 100 milliseconds) then signals can be spread out every millisecond. Synchronization can be performed via a standard synchronization protocol, such as Network Time Protocol (NTP).
Endpoints periodically determine the WAN data rate, i.e., the speed of the WAN link. The WAN data rate may be dynamic (vary over time).
In order to share the WAN bandwidth, it is first necessary for the system to know the WAN data rate (WAN link speed). Further, certain WAN technologies, such as Frame Relay, have variable data rates. In such cases the system must distinguish between the minimum guaranteed rate, sometimes called the Committed Information Rate (CIR), and the maximum access rate, sometimes called the Excess Information Rate (EIR).
When the WAN data rate is static and known ahead of time, endpoints can be simply pre-configured with this information via the installed policy.
When the WAN data rate is dynamic or static but unknown, it must be computed. The system computes the data rate by performing a speed test. Prior art describes speed testing for a single host. The method herein is for performing speed testing in a distributed system. The speed test involves transferring data to or from one or more known fast servers, herein known as speed test servers. (On the Internet, there are public speed test servers, such as DSLreports.com. It is also possible to set up and use a speed test server on a corporate network.)
The data rate is computed by clocking the data transfer and dividing the data size in bits by the transfer time in seconds minus connection/disconnection time (if using TCP or another connection-oriented protocol. The key requirement is that there is sufficient data and both the sending and receiving hosts are sufficiently fast to completely saturate the WAN link.
Several methods may be used to compute the WAN data rate in a peer signalling system, two of which are described below.
In the dedicated speed test, a designated endpoint, known as the tester, requests other endpoints to briefly pause transmitting, then performs a speed test. The tester first sends a pause signal to the other endpoints to request quiet time. Endpoints receiving a pause interpret may elect to delay or ignore the pause request. Therefore the tester must wait until all other endpoints cease transmitting, or give up and try again later if transmissions continue unabated. Once the network is quiet, the tester performs a speed test, possibly in both directions. Upon computing the WAN data rate, which typically takes no more than a couple of seconds, the tester communicates the results via the info or set signal.
In a system with a designated manager, the manager listens for info signals and will set the new WAN data rate.
In the piggyback speed test, the speed test is performed by clocking part of an existing data transfer. Any endpoint can perform the test providing the following two conditions are met:
1 ) no other endpoints transmit during the speed test (determined by absence of other transmit signals)
2) the data transfer saturates the WAN data link
Upon successfully completing the speed test, the results are communicated via the info or set signal. For example, a piggyback speed test may be combined with downloading an operating system update or updating a local cache.
There is a variety of prior-art techniques for determining when a WAN link is saturated. For example, one active measurement technique involves injecting multiple Internet Control Message Protocol (ICMP) 'ping' packets into the WAN and measuring inter-packet delay, round trip times, and packet losses. The speed test server may also be utilized for performing active measurements.
Endpoints that implement the peer signalling protocol are referred to as signalling devices. In a fully managed LAN, all endpoints should be configured to be signalling, to ensure that the traffic contributed by all endpoints is taken into account. Traffic originating from signalling devices can be identified by signing packets, namely, adding a signature to each packet.
One signing technique is packet colouring or packet marking, i.e., writing specific packet header fields, for example, the IP Layer 3 Type of Service (ToS) or Differentiated Services (DiffServ) field. Marks may be altered dynamically to minimize the risk of spoofing by non-signalling devices.
Another signing technique is encapsulation, which involves encapsulating the entire packet within another protocol, for example, by using Generic Routing Encapsulation (GRE). While the main use of GRE is to route IP packets between private IP networks across an internet, it is also feasible to encapsulate packets over a LAN. Further, the encapsulation may include a digital signature for strong security.
Conversely, non-signalling endpoints will not sign packets, and can therefore be identified by the absence of a packet signature, i.e., the correct packet mark or encapsulation.
Each endpoint in the system may be optionally configured to store data that is requested from a data source via the WAN, thereby creating a distributed cache. Endpoints requesting data via the WAN can first request if data is available from one of their peers via a get signal. If a peer already has the data, the data can fetched quickly via the LAN, thereby eliminating redundant data transfers via the slower WAN.
Each endpoint in the system may optionally store numerous network statistics, such as bandwidth, round-trip time, latency, etc. Statistics for the system as a whole can then be aggregated to one or more designated reporter, specified by the policy. The reporter may be local to the LAN or accessible via the WAN. A possible aggregation method is Push-based aggregation wherein each endpoint will periodically push statistics to the reporter via an info signal.
Alternatively Query-based aggregation may be used wherein The reporter will periodically query each endpoint with a get signal and request the latest statistics.
Each endpoint in the system may be optionally configured via the installed policy to detect and respond to anomalous network conditions. For example, so-called port scanning or Denial of Service (DOS) style attacks, resulting in hosts creating and destroying large numbers of connections per second, are characteristic of network viruses. Such conditions can be detected and trigger self-policing behavior, for example, rate limiting some or all traffic originating from the infected host.
Although the invention has been herein shown and described in what is conceived to be the most practical and preferred embodiment, it is recognised that departures can be made within the scope of the invention, which is not to be limited to the details described herein but is to be accorded the full scope of the appended claims so as to embrace any and all equivalent devices and apparatus.

Claims

1. A network communications protocol for use in a computer network including a shared network resource and a plurality of endpoints adapted to send traffic to the network resource, said protocol adapted to allow endpoints in the network to communicate their respective requirements for access to the network resource to each other; and to communicate a policy for access to the network resource by said endpoints, and to allow negotiation of access to the network resource for the respective endpoint in accordance with the policy and the requirements information communicated by other endpoints.
2. The protocol of claim 1 wherein the protocol includes means for endpoints to identify each other's presence on the network.
3. The protocol as in any one of the preceding claims wherein the protocol includes means to communicate relative priority information between endpoints.
4. The protocol as in any one of the preceding claims wherein the protocol includes means to communicate any or all of an endpoint's requested bandwidth, the data rate of the network resource, network statistics and network data.
5. The protocol as in any one of the preceding claims wherein the protocol includes means to implement a distributed cache amongst a plurality of endpoints.
6. The protocol as in any one of the preceding claims wherein the network resource is an access point to a wide area network.
7. The protocol as in any one of the preceding claims wherein the network resource is an access point to the internet.
8. The protocol as in any one of the preceding claims wherein the policy for allocation of access to the network resource is a policy for allocation of a portion of bandwidth on a wide area network or internet connection to each endpoint, calculated as total available bandwidth available on the link divided by the number of endpoints.
9. The protocol as in any one of the preceding claims wherein the policy for allocation of access to the network resource is a policy for allocation of a portion of bandwidth on a wide area network or internet connection to each endpoint, based on pre-set or communicated relative priority of each endpoint.
10. A network traffic management system for managing traffic flows to a network resource including a plurality of endpoints adapted to send traffic to the network resource, means to set and communicate a policy for access to the network resource by said endpoints, a software agent associated with each of said endpoints adapted to communicate with each other said agent, and to negotiate access to the network resource for the respective endpoint in accordance with the policy and the information communicated by each other agent.
11.The network traffic management system of claim 10 wherein the network endpoints are computing devices.
12. The network traffic management system of claim 10 or claim 11 wherein the network endpoints are client devices such as desktop computers, laptop computers and handheld computers.
13. The network traffic management system of any one of claims 10- 12wherein an endpoint is a computer server.
14. The network traffic management system of any one of claims 10 -13 wherein an endpoint is a computer peripheral, such as a printer or scanner.
15. The network traffic management system of any one of claims 10 - 14wherein each endpoint includes means to implement the requirements of the policy by rate limiting.
16. The network traffic management system of any one of claims 10 -15 wherein each endpoint includes means to implement the requirements of the policy by rate limiting.
17. The network traffic management system of any one of claims 10 -
1 δwherein the local area network is a wireless network or a 3G mobile telephony network.
18. A method of shaping traffic presented to a network resource in a local area network including the steps of providing software agents at each of a plurality of network endpoints on a local area network, said agents being adapted to communicate with each other agent by signals passed over the local area network; providing at each endpoint means to regulate the traffic presented to the network resource by that endpoint; providing and communicating to each agent a policy for the allocation of use of the network resource among the plurality of endpoints; each agent communicating with each other agent to negotiate access to the network resource according to the policy and the communicated traffic requirements of each endpoint.
19. The method of claim 18 wherein there resides on the local area network at least one endpoint adapted to set and communicate said policy for access.
20. The method of any one of claims 18-19wherein each endpoint includes means to implement the requirements of the policy by rate limiting.
21. The method of any one of claims 18-20 wherein the local area network is a wireless network or a 3G mobile telephony network.
PCT/AU2005/001514 2004-10-06 2005-10-05 Peer signalling protocol and system for decentralized traffic management WO2006037163A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
AU2005291837A AU2005291837A1 (en) 2004-10-06 2005-10-05 Peer signalling protocol and system for decentralized traffic management
AT05789430T ATE474275T1 (en) 2004-10-06 2005-10-05 PEER SIGNALING PROTOCOL AND DECENTRALIZED TRAFFIC MANAGEMENT SYSTEM
DE602005022344T DE602005022344D1 (en) 2004-10-06 2005-10-05 TRALIZED TRANSPORT MANAGEMENT
EP05789430A EP1817683B1 (en) 2004-10-06 2005-10-05 Peer signalling protocol and system for decentralized traffic management

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2004905742 2004-10-06
AU2004905742A AU2004905742A0 (en) 2004-10-06 Peer signalling protocol and system for decentralized traffic management

Publications (1)

Publication Number Publication Date
WO2006037163A1 true WO2006037163A1 (en) 2006-04-13

Family

ID=36125392

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2005/001514 WO2006037163A1 (en) 2004-10-06 2005-10-05 Peer signalling protocol and system for decentralized traffic management

Country Status (6)

Country Link
US (1) US8799472B2 (en)
EP (1) EP1817683B1 (en)
AT (1) ATE474275T1 (en)
DE (1) DE602005022344D1 (en)
ES (1) ES2349739T3 (en)
WO (1) WO2006037163A1 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8861418B2 (en) * 2007-07-10 2014-10-14 Qualcomm Incorporated Methods and apparatus for supporting group communications with data re-transmission support
US8694662B2 (en) * 2007-07-10 2014-04-08 Qualcomm Incorporated Method and apparatus for communicating transmission requests to members of a group and/or making group related transmission decisions
US7961698B2 (en) * 2007-07-10 2011-06-14 Qualcomm Incorporated Methods and apparatus for controlling interference to broadcast signaling in a peer to peer network
US8495232B2 (en) * 2007-07-10 2013-07-23 Qualcomm Incorporated Methods and apparatus for supporting broadcast communications in a peer to peer network
US20090016317A1 (en) * 2007-07-10 2009-01-15 Qualcomm Incorporated Methods and apparatus for supporting group communications utilizing device identifiers
US20090094691A1 (en) * 2007-10-03 2009-04-09 At&T Services Inc. Intranet client protection service
US8014316B2 (en) * 2007-10-17 2011-09-06 Verizon Patent And Licensing Inc. System, method and computer-readable storage medium for calculating addressing and bandwidth requirements of a network
CN101945444B (en) * 2009-07-06 2016-06-29 华为技术有限公司 Communication means, device and system
US9088768B1 (en) * 2011-03-23 2015-07-21 Cox Communications, Inc. Processing quality of service data to provide a prediction of quality of experience
US9037699B1 (en) * 2011-03-23 2015-05-19 Cox Communications, Inc. Statistically determining average network speed in a communications network
US9237339B1 (en) * 2011-03-23 2016-01-12 Cox Communications, Inc. Framework for quantifying a total quality of experience for subscribers in a communications network
US11201800B2 (en) 2019-04-03 2021-12-14 Cisco Technology, Inc. On-path dynamic policy enforcement and endpoint-aware policy enforcement for endpoints
US11811646B2 (en) 2022-02-28 2023-11-07 Microsoft Technology Licensing, Llc Decentralized wide-area network traffic engineering

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2302606A (en) * 1995-06-23 1997-01-22 Fujitsu Ltd Managing shared data resources
WO2001080524A2 (en) * 2000-04-17 2001-10-25 Circadence Corporation Method and system for overcoming denial of service attacks
US20020119821A1 (en) * 2000-05-12 2002-08-29 Sanjoy Sen System and method for joining a broadband multi-user communication session
US20020143966A1 (en) * 2001-04-02 2002-10-03 Salvador Sibecas System for dynamic process assignment in a local area network and method therefor
US20040064558A1 (en) * 2002-09-26 2004-04-01 Hitachi Ltd. Resource distribution management method over inter-networks
US20040073668A1 (en) * 2002-10-10 2004-04-15 Shivaram Bhat Policy delegation for access control
EP1422904A2 (en) * 2002-11-25 2004-05-26 Microsoft Corporation Method and systems for sharing a network resource with a user without current access
WO2004068722A2 (en) * 2003-01-24 2004-08-12 Coco Communications Corp. Method and apparatus for secure communications and resource sharing between anonymous non-trusting parties with no central administration
US20050102399A1 (en) * 2003-11-10 2005-05-12 Hitachi, Ltd. Exclusive control system and method for using shared resource

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7260635B2 (en) * 2000-03-21 2007-08-21 Centrisoft Corporation Software, systems and methods for managing a distributed network
FI109061B (en) * 2000-05-10 2002-05-15 Nokia Corp Resource reservation on a packet network

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2302606A (en) * 1995-06-23 1997-01-22 Fujitsu Ltd Managing shared data resources
WO2001080524A2 (en) * 2000-04-17 2001-10-25 Circadence Corporation Method and system for overcoming denial of service attacks
US20020119821A1 (en) * 2000-05-12 2002-08-29 Sanjoy Sen System and method for joining a broadband multi-user communication session
US20020143966A1 (en) * 2001-04-02 2002-10-03 Salvador Sibecas System for dynamic process assignment in a local area network and method therefor
US20040064558A1 (en) * 2002-09-26 2004-04-01 Hitachi Ltd. Resource distribution management method over inter-networks
US20040073668A1 (en) * 2002-10-10 2004-04-15 Shivaram Bhat Policy delegation for access control
EP1422904A2 (en) * 2002-11-25 2004-05-26 Microsoft Corporation Method and systems for sharing a network resource with a user without current access
WO2004068722A2 (en) * 2003-01-24 2004-08-12 Coco Communications Corp. Method and apparatus for secure communications and resource sharing between anonymous non-trusting parties with no central administration
US20050102399A1 (en) * 2003-11-10 2005-05-12 Hitachi, Ltd. Exclusive control system and method for using shared resource

Also Published As

Publication number Publication date
EP1817683A4 (en) 2008-01-23
US20060072457A1 (en) 2006-04-06
DE602005022344D1 (en) 2010-08-26
US8799472B2 (en) 2014-08-05
ES2349739T3 (en) 2011-01-11
ATE474275T1 (en) 2010-07-15
EP1817683B1 (en) 2010-07-14
EP1817683A1 (en) 2007-08-15

Similar Documents

Publication Publication Date Title
EP1817683B1 (en) Peer signalling protocol and system for decentralized traffic management
EP1350363B1 (en) Method and apparatus for the assessment and optimization of network traffic
US7336613B2 (en) Method and apparatus for the assessment and optimization of network traffic
US7778176B2 (en) Methods, apparatuses and systems facilitating concurrent classification and control of tunneled and non-tunneled network traffic
Shah et al. Dynamic bandwidth management in single-hop ad hoc wireless networks
US7773536B2 (en) Method and apparatus for the assessment and optimization of network traffic
US7551623B1 (en) Modulation of partition parameters achieving delay-based QoS mechanism
US20150365325A1 (en) Software defined networking based congestion control
US9124547B2 (en) System and method for enforcing uplink wireless medium usage in wireless networks
JP2004236332A (en) Identification of packet data flow for multiplexing
Dunn et al. A practical cross-layer mechanism for fairness in 802.11 networks
US11381508B2 (en) System and method for accelerating or decelerating a data transport network protocol based on real time transport network congestion conditions
JP5775214B2 (en) Data packet loss reduction system and method using adaptive transmission queue length
Shewmaker et al. TCP inigo: ambidextrous congestion control
Habib et al. Monitoring and controlling QoS network domains
Ito et al. A bandwidth reallocation scheme to improve fairness and link utilization in data center networks
Ito et al. A bandwidth allocation scheme to improve fairness and link utilization in data center networks
Diarra et al. RAPID: A RAN-aware performance enhancing proxy for high throughput low delay flows in MEC-enabled cellular networks
Zhang Deadline-aware bandwidth sharing by allocating switch buffer in data center networks
AU2005291837A1 (en) Peer signalling protocol and system for decentralized traffic management
EP4195763A1 (en) Packet processing method and related device
Zou et al. Throughput models for SCTP with parallel subflows
US11805071B2 (en) Congestion control processing method, packet forwarding apparatus, and packet receiving apparatus
Zou et al. Performance evaluation of subflow capable SCTP
Mehra et al. Design considerations for rate control of aggregated tcp connections

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2005291837

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 2005789430

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2005789430

Country of ref document: EP